70
3.4.2
Configuring the Product
By default, F-Secure Internet Gatekeeper has very strict access control
settings for security reasons. You have to configure F-Secure Internet
Gatekeeper before you can use it properly. Follow these instructions
before you start using F-Secure Internet Gatekeeper:
F-Secure Anti-Virus for Internet Mail
1.
Make sure that you define the internal network addresses of your
company with the
Intranet Hosts
setting. For more information, see
2.
Specify hosts that are allowed or not allowed to connect to F-Secure
Anti-Virus for Internet Mail in the
Allowed hosts
and
Denied hosts
settings. For more information, see “
3.
Configure the virus scanning to specify the type of traffic you want to
scan.
For mail traffic scanning, see “
.
Make sure that you limit users who are allowed to receive
e-mail messages to the users in the corporate network. For
more information, see “
4.
Configure mail delivery on the Mail Routing Table. For more
information, see “
.
F-Secure Anti-Virus for Internet Gateways
1.
If you already have a web proxy in your network, check the proxy
chaining settings. For more information, see “
2.
Configure network and performance settings to make sure that
F-Secure Internet Gatekeeper works properly. For more information,
see “
Configuring F-Secure Anti-Virus for Internet Gateways
, and
Summary of Contents for Internet Gatekeeper
Page 1: ...F Secure Internet Gatekeeper Windows 2000 2003 Server Administrator s Guide ...
Page 10: ...10 ABOUT THIS GUIDE How This Guide is Organized 11 Conventions Used in F Secure Guides 13 ...
Page 26: ...26 2 DEPLOYMENT Overview 27 Deployment Scenarios 29 ...
Page 58: ...58 Step 10 Enter the IP address of the F Secure Policy Manager Server Click Next to continue ...
Page 261: ...CHAPTER10 261 Quarantine Management Figure 10 1 Quarantine Query page ...
Page 296: ...296 A APPENDIX Warning Messages HTTP Warning Messages 297 SMTP Warning Messages 298 ...
Page 304: ...304 C APPENDIX Access Log Variables List of Access Log Variables 305 ...
Page 309: ...309 D APPENDIX Mail Log Variables List of Mail Log Variables 310 ...
Page 360: ...360 G APPENDIX Services and Processes List of Services and Processes 361 ...
Page 414: ...414 ...